Skip to main content

OpenSecurityTraining.info

In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long.

All material is licensed with an open license like CreativeCommons, allowing anyone to use the material however they see fit, so long as they share modified works back to the community.

We highly encourage people who already know these topic areas to take the provided material and pursue paid and unpaid teaching opportunities.

Those who can, teach.

302
RESULTS
rss



PART OF
Computers & Technology

TOPIC atoz
Education 155
Training 155
Classes 144
Computers 143
security 135
PE 133
IA32 132
Computer 131
Intel 122
x86 122
Security 119
Intel x86 107
Malware 85
classes 84
ASLR 76
DEP 76
SEH 76
EAT 74
IAT 74
PE/COFF 74
WinDbg 74
TLS 63
UPX 63
lexing 63
linking 63
packers 63
parsing 63
IDA 60
IDA Pro 60
ProcMon 59
RegShot 59
YARA 59
ELF 51
malware 35
DRTM 26
PCR 26
PCRs 26
SRTM 26
TPM 26
trust 26
exports 23
imports 23
SEHOP 13
SafeSEH 13
fuzzer 13
fuzzing 13
paging 13
port IO 13
TOR 12
html5 12
linker 12
packing 12
privacy 12
ARM 11
Argus 11
Bro 11
DKOM 11
LANGUAGE
English 43
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
OpenSecurityTraining.info
movies
eye 21,662
favorite 5
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 9,666
favorite 2
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 7,458
favorite 2
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 6,613
favorite 2
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 6,089
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 5,875
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 5,634
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 5,410
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
Get the class materials to follow along athttp://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.htmlFollow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.htmlThroughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel, x86,...
OpenSecurityTraining.info
movies
eye 5,269
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 5,114
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 5,017
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 4,957
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 4,446
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 4,440
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 4,205
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
by Gananand Kini
movies
eye 4,032
favorite 0
comment 0
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand,...
Topics: OpenSecurityTraining.info, ARM, Acorn RISC Machine, Advanced RISC Machine, assembly, disassembly,...
OpenSecurityTraining.info
by Mike McFail & Ben Actis
movies
eye 3,761
favorite 0
comment 0
Get the class materials to follow along at http://OpenSecurityTraining.info/Flow.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Mike McFail & Ben Actis focuses on network analysis and hunting of malicious activity from a security operations center perspective. We will dive into the netflow strengths, operational limitations of netflow, recommended sensor placement, netflow tools, visualization of network data, analytic trade craft for network situational awareness...
Topics: OpenSecurityTraining.info, network security, netflow, flow analysis, netflow analysis, network...
OpenSecurityTraining.info
movies
eye 3,661
favorite 2
comment 0
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 3,594
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 3,478
favorite 0
comment 0
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows. Window's exploit mitigations such...
Topics: OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows,...
OpenSecurityTraining.info
movies
eye 3,384
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.htmlFollow us on Twitter for class news @OpenSecTraining.An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist.As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies
eye 3,278
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
by Mike McFail & Ben Actis
movies
eye 3,209
favorite 0
comment 0
This is the Ubuntu Linux VM that can be used for doing labs associated with the class here:https://archive.org/details/FlowAnalysisP1Introhttp://opensecuritytraining.info/Flow.html
Topics: OpenSecurityTraining.info, network security, netflow, flow analysis, netflow analysis, network...
OpenSecurityTraining.info
by Corey K.
movies
eye 3,092
favorite 0
comment 0
This is the Ubuntu Linux VM that can be used for doing labs associated with the class here:http://archive.org/details/Day1Part1IntroductionToSoftwareExploitshttp://opensecuritytraining.info/Exploits1.html
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,946
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,708
favorite 1
comment 0
Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through a multilevel paging system. We will also talk about memory segmentation. •The...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,627
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,617
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,590
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,588
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,585
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,575
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 2,558
favorite 1
comment 0
Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through a multilevel paging system. We will also talk about memory segmentation. •The...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,557
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
by Veronica Kovah
movies
eye 2,520
favorite 0
comment 0
Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.htmlFollow us on Twitter for class news @OpenSecTraining.This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies
eye 2,456
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,435
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,379
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,353
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,338
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,337
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,315
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,313
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,312
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,309
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,287
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,277
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,261
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,248
favorite 0
comment 0
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows. Window's exploit mitigations such...
Topics: OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows,...
OpenSecurityTraining.info
movies
eye 2,217
favorite 0
comment 0
Get the class materials to follow along athttp://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.htmlFollow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.htmlThroughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel, x86,...
OpenSecurityTraining.info
movies
eye 2,187
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 2,172
favorite 0
comment 0
Get the class materials to follow along athttp://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.htmlFollow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.htmlThroughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel, x86,...
OpenSecurityTraining.info
movies
eye 2,164
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,163
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,152
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,140
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 2,138
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,066
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,064
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,024
favorite 1
comment 0
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 1,975
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 1,956
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 1,953
favorite 1
comment 0
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 1,900
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 1,887
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 1,877
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 1,868
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 1,858
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 1,854
favorite 0
comment 0
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows. Window's exploit mitigations such...
Topics: OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 1,812
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 1,777
favorite 0
comment 0
Get the class materials to follow along athttp://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.htmlFollow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.htmlThroughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel, x86,...
OpenSecurityTraining.info
movies
eye 1,741
favorite 1
comment 0
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 1,724
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.htmlFollow us on Twitter for class news @OpenSecTraining.An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist.As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
by Gananand Kini
movies
eye 1,723
favorite 0
comment 0
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand,...
Topics: OpenSecurityTraining.info, ARM, Acorn RISC Machine, Advanced RISC Machine, assembly, disassembly,...